Partners

“If the encryption vendor offers options for ‘function preserving encryption’ – for example, to preserve sort – regulations may require the use of standardized and approved algorithms or proof of independent certification for the potentially weakened encryption.”

- Analyst ,
Gartner Group

“Enterprises should always check the claims of vendors that their solutions are based on proven security models. The highest level of security is currently provided by solutions that are on-premise, with keys not available anywhere in the cloud where the algorithms comply with internationally accepted standards.”

- Analyst ,
Gartner Group